Search
Content type: Long Read
The security of our devices, applications and infrastructure is paramount to the safe functioning of our digital lives. Good security enables trust in our systems, it is fundamental to protecting the critical information we store and exchange through networks and devices. Similar to how we physically secure our homes, offices and schools, securing devices and software allows us to operate in safe and trusted environments where our security is guaranteed and protected.Security for information…
Content type: News & Analysis
We’ve been asked a lot lately about whether it is safe to travel, particularly to the US. And it’s not surprising why: the US Government is increasing their cruelty at borders.Border management today is fueled by our data, but government officials want more. They want as much data as they can get to catch you out. They’ve reportedly detained or deported people based on their free speech activities, denying entry on tenuous grounds like having the wrong photos on phones (including in in the ‘…
Content type: Long Read
It’s important to us at PI that we continue to create real change in the world. We want our work to matter, and we challenge ourselves continuously to verify that it does.In 2024 we made substantial progress towards concrete systemic change. We challenged governments and corporations that exploit data and technology, pushed for new national and international policy standards, drove standard-setting action by courts and regulators. We educated and campaigned with others.As a result, we produced…
Content type: Explainer
Imagine this: a power that secretly orders someone anywhere in the world to abide and the receiver can’t tell anyone, can’t even publicly say if they disagree, and can’t really question the power in open court because the secret order is, well, secret. Oh and that power affects billions of people’s security and their data. And despite being affected, we too can’t question the secret order.In this piece we will outline what’s ridiculous, the absurd, and the downright disturbing about what’s…
Content type: Long Read
Intrusive surveillance technology is increasingly used during protests around the world, and we’ve been tracking its use around the world for years.This technology is often being deployed in secret, without a clear legal basis and without the safeguards and oversight applied to other surveillance technologies under international human rights law.We’ve increasingly observed the use of unlawfully generated and collected data from these technologies being used in court against people exercising…
Content type: Long Read
Increasingly, EdTech systems are less about teaching than about monitoring, security and ‘safety’ – although those aims are often mixed with wider educational claims.For instance, one company offering “high quality surveillance systems and CCTV for schools including sophisticated infra-red cameras which record in the darkest areas” claimed that these both deter “bad or antisocial behaviour from pupils, parents and visitors” and improve the concentration, productivity and attainment of the…
Content type: News & Analysis
We’ve published a new tech explainer on election technologies in Kenya. The explainer takes a deep dive into the technologies employed to manage and administer the election process in Kenya, such as biometric voter registration (BVR), voter identification, results transmission, and candidate management systems.Electoral processes - along with elections themselves - are one of the largest government data-gathering exercises undertaken, making them susceptible to data exploitation and privacy…
Content type: Long Read
INTRODUCTION
In recent years, major tech platforms have been rapidly evolving their business models. Despite their dominance in various markets, tech giants like Google and Meta are venturing into new territories to expand their user base. One of the most striking ventures has been their foray into the "connectivity market" through substantial, and occasionally unsuccessful, investments in network infrastructure.
Many tech companies are investing resources into network infrastructure, either…
Content type: Long Read
Social media is now undeniably a significant part of many of our lives, in the UK and around the world. We use it to connect with others and share information in public and private ways. Governments and companies have, of course, taken note and built fortunes or extended their power by exploiting the digital information we generate. But should the power to use the information we share online be unlimited, especially for governments who increasingly use that information to make material…
Content type: Long Read
Sports are a huge part of daily life for billions around the world, a fundamental aspect of the rich tapestry of the human experience.Attending a major sporting event can be a formative experience in someone’s life, as a place to share in a communal culture.Increasingly we have seen surveillance, and especially mass surveillance measures, being introduced at sports events impeding the enjoyment particularly of the right to privacy and right to participate in sporting life.When we saw that the…
Content type: News & Analysis
On 15 May 2024, a London Administrative Court handed down its judgment in the case of ADL & Ors v Secretary of State for the Home Department, just two months after another court judgment and a ruling of the UK's data protection authority (ICO). The four Claimants in this latest case (including asylum seekers and survivors of trafficking) were challenging the UK Home Office's policy of placing people released from immigration detention under 24/7 GPS surveillance - either by shackling them…
Content type: Long Read
IntroductionFor years PI has been exposing and advocating against the use of facial recognition technology (FRT) and the grave threats it poses to our rights. This highly invasive technology is paving the way to a dystopian, biometric surveillance state, where everyone is identified and tracked everywhere they go, in real time, as they move through public spaces during their everyday lives. Furthermore, this is taking place within a democratic vacuum, without any specific legislation pertaining…
Content type: Long Read
TAKE ACTION TO STOP THE END OF PRIVACY IN PUBLIC1. IntroductionThe use of facial recognition technology (FRT) by law enforcement and private companies in public spaces throughout the UK is on the rise. In August 2023, the government announced that it is looking to expand its use of FRT, which it considers “an increasingly important capability for law enforcement and the Home Office”. The indiscriminate use of this dystopian biometric technology to identify individuals in public spaces is a form…
Content type: Long Read
In 2022, Privacy International continued to produce real change by challenging governments and corporations that use data and technology to exploit us. And, we produced substantial impact that directly affects each of us.
Here are a handful of our biggest achievements in 2022.
WE CHALLENGED COMPANIES TO CHANGE THEIR BUSINESS MODELS AND PRACTICES
Regulators in UK, France, Greece, and Italy fined and restricted Clearview AI’s activity
Clearview AI built a massive database of our biometrics, by…
Content type: News & Analysis
Our mobile phones contain all kinds of data that ranges from photos, videos and emails to information about our health, the places we visit and our leisure time. This data is often relied upon by law enforcement authorities in criminal investigations.
Mobile phone extraction (MPE) tools are used for this purpose as they enable police and other authorities to download content and associated data from people’s phones. These tools are supplied by private companies to security forces and…
Content type: Long Read
On 18th January, it was announced that end-to-end encrypted iCloud services, Advanced Data Protection, would be offered to Apple users globally.The offer of such level of security globally, while overdue, is a key step to ensuring trust and confidence in today’s world. There are too many threats to our data and our rights. Twelve years ago, we called on Apple to encrypt iCloud storage for users all around the world.Why this is importantWhile privacy and security is often portrayed as opposite…
Content type: News & Analysis
We have been fighting for transparency and stronger regulation of the use of IMSI catchers by law enforcement in the UK since 2016. The UK police forces have been very secretive about the use of IMSI catchers – maintaining a strict “neither confirm nor deny” (NCND) policy. In our efforts to seek greater clarity we wrote to the UK body which monitors the use of covert investigatory powers, the Investigatory Powers Commissioner’s Office (IPCO), asking the Commissioner to revisit this…
Content type: Long Read
The UK’s security services have the power to collect, analyse, and store huge amounts of personal data. They can target specific individuals, hack their computers, and intercept their data or communications, but they can also obtain personal datasets in bulk, intercept overseas communications in bulk, and collect huge swathes of communications data from telecomms providers.[1]
The public rightly expects that the vast amounts of personal data which agencies like MI5 collect and store will be…
Content type: News & Analysis
In a judgment of 14 October 2022, the UK High Court ordered the UK Home Office to provide remedy to the thousands of migrants affected by its unlawful policy and practice of seizing mobile phones from people arriving by small boats to UK shores.
The availability and spread of new technologies, and the exponential amounts of data they generate, are regularly being abused by governments to surveil and control people - but these new forms of surveillance are only starting to make their way through…
Content type: News & Analysis
Privacy International (PI) has today filed complaints with the Information Commissioner (ICO) and Forensic Science Regulator (FSR) against the UK Home Office's use of GPS ankle tags to monitor migrants released on immigration bail. This policy and practice represents a seismic change in the surveillance of migrants in the UK. PI was first alerted to this scheme by organisations such as Bail for Immigration Detainees, an independent charity that exists to challenge immigration detention in the…
Content type: News & Analysis
The relationship between privacy and access to abortion care
In 1973, in the state of Texas, it was a criminal offence to “procure or attempt” an abortion except if the purpose was “saving the life of the mother.” This law was enacted in 1854 by the Texas state legislature, and was part of a wave of provisions criminalising access to abortion care that was gaining ground across the U.S in the mid-1800s. It is worth highlighting that these laws were being passed at a time when women in the U.S…
Content type: Long Read
The same day that the United Nations General Assembly convened an emergency special session to respond to Russia’s full-scale invasion of Ukraine in early March, a very different set of negotiations was underway in another U.N. conference room. More than two years after its establishment, the Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of Information and Communication Technologies for Criminal Purposes (hereinafter the Ad Hoc Committee) held its…
Content type: Report
Privacy International’s submissions for the Independent Chief Inspector of Borders and Immigration inspection of the Home Office Satellite Tracking Service Programme
The Home Office have introduced 24/7 electronic monitoring and collection of the location data of migrants via GPS ankle tags. This seismic change cannot be overstated. The use of GPS tags and intention to use location data, kept for six years after the tag is removed, in immigration decision-making goes far beyond the mere…
Content type: Press release
Today, the High Court ruled that the Home Secretary acted unlawfully and breached human rights and data protection laws by operating a secret, blanket policy of seizing, retaining and extracting data from the mobile phones of asylum seekers arriving by small boat.
This claim for judicial review was brought by three asylum seeking claimants: HM represented by Gold Jennings, and KA and MH represented by Deighton Pierce Glynn. The Claimants, like thousands of others arriving by small boat, all…
Content type: News & Analysis
Background
Today judgment has been handed down in the landmark case of R (HM and MA and KH) v Secretary of State for the Home Department.
This is a Judicial Review decision concerning the UK Home Office’s secret and blanket policy of seizing mobile phones of all migrants who arrived to the UK by small boat between April 2020 and November 2020, and extracting data from all phones. PI was a third party intervener in the case.
The case revealed that migrants were searched on arrival at Tug Haven…
Content type: News & Analysis
What if we told you that every photo of you, your family, and your friends posted on your social media or even your blog could be copied and saved indefinitely in a database with billions of images of other people, by a company you've never heard of? And what if we told you that this mass surveillance database was pitched to law enforcement and private companies across the world?
This is more or less the business model and aspiration of Clearview AI, a company that only received worldwide…
Content type: Long Read
Zimbabwe has a history of state led surveillance that is carried out more for political gain than for the investigation of legitimate criminal activities. During former President Mugabe’s 37 year rule the government used laws and state security structures to carry out targeted surveillance of persons of political interest and more generalised mass surveillance of the population.
Specific laws such as the Interception of Communications Act as well as mandatory SIM-card registration regulations…
Content type: Long Read
In early August, the African Union (AU) issued a statement condemning Denmark’s Aliens Act which, among other things, allows Demark to relocate asylum seekers to countries outside the European Union while their cases are being processed.
The AU argues that this amounts to an abdication by Denmark of “…its international responsibility to provide asylum and protection to those that enter its territory…’’ More importantly, the AU says this is an “extension of the borders of such countries and an…
Content type: News & Analysis
Introduction
The European Parliament has adopted a nonbinding resolution against the use of artificial intelligence (AI) by law enforcement in public spaces and a ban on facial recognition databases, such as the ones used by Clearview AI.
It is a significant and hugely welcome step in an ongoing campaign to ensure the EU leads the world in protecting against dangerous applications of AI within its borders.
The Resolution recognises the need to safeguard against application of AI and mass…
Content type: Long Read
Introduction
Technology has driven a number of changes in the way that financial services are packaged and accessed by consumers. These changes have led to the rise of fintech, a data intensive industry that has been touted for its convenience and as an alternative to traditional financial services.
The current article looks at the use of digital loan Apps in Philippines and Kenya and contextualises the global discussions on fintech which we have been monitoring for some years. Research…